Escolar Documentos
Profissional Documentos
Cultura Documentos
Allison Burtch
Claire L. Evans
Denise Caruso
Harlo Holmes
Ingrid Burrington
Jillian C. York
Jen Lowe
Kate Crawford
Lindsay Howard
Lorrie Faith Cranor & CUPS
Maddy Varner
Maral Pourkazemi
Runa A. Sandvik
Addie Wagenknecht
Allison Burtch
Claire L. Evans
Denise Caruso
Harlo Holmes
Ingrid Burrington
Jen Lowe
Jillian C. York
Kate Crawford
Lindsay Howard
Lorrie Faith Cranor & CUPS
Maddy Varner
Maral Pourkazemi
Runa A. Sandvik
F O R E
W O R D
The book you are holding was created in five days by a dozen
women. It represents the capstone to Deep Lab, a residency hosted by the Frank-Ratchye STUDIO for Creative Inquiry at Carnegie Mellon University (CMU) in collaboration with CMUs CyLab
Usable Privacy and Security Laboratory.
Deep Lab is a congress of cyberfeminist researchers, organized
by STUDIO Fellow Addie Wagenknecht to examine how the
themes of privacy, security, surveillance, anonymity, and largescale data aggregation are problematized in the arts, culture and
society. During the second week of December 2014, the Deep Lab
participantsa group of internationally acclaimed new-media
artists, information designers, data scientists, software engineers,
hackers, writers, journalists and theoreticiansgathered to engage in critical assessments of contemporary digital culture. They
worked collaboratively at the STUDIO in an accelerated pressure
project, blending aspects of a booksprint, hackathon, dugnad,
charrette, and a micro-conference. The outcomes of this effort
include the visualizations, software, reflections and manifestos
compiled in this book; an album of ten lecture presentations,
the Deep Lab Lecture Series, which can be found in the STUDIOs
online video archive; and a twenty-minute documentary film
featuring interviews with the Deep Lab participants.
D EEP
L A B
C O N T E NTS
FORWARD
INTRO
Addie Wagenknecht
12
23
Jen Lowe
CYBERFEMINISM
59
Claire Evans
WHAT IS GOING ON
89
Allison Burtch
SUBTEXT
95
Jillian C. York
97
Denise Caruso
3 NETWORK INFRASTRUCTURES
107
Ingrid Burrington
129
Ingrid Burrington
TORTURE REPORTS
139
UNVEILLANCE
133
Harlo Holmes
324/1033
141
Ingrid Burrington
CENSOR WEAR
163
FOXXY DOXXING
171
Harlo Holmes
SECURE DROP
181
Runa A. Sandvik
THIS IS MY CHAPTER
183
Maddy Varner
PRIVACY ILLUSTRATED
185
AFTERWORDS
227
ACKNOWLEDGMENTS
234
236
COLOPHON
238
I N T R O
The web is largely void of a female presencesave
for sexualized imagesfemale hackers must engage
with the future, in order to make our presence in
history indelible.
And so Deep Lab was born.
D EEP
1 2
L A B
D EEP
L A B
13
Allison Burtch
Researcher/Artist/Activist
Claire Evans
Denise Caruso
Harlo Holmes
Developer
Ingrid Burrington
Kate Crawford
Jen Lowe
Jillian York
Lindsay Howard
Lorrie Cranor
Madeleine Varner
Artist/Developer
Maral Pourkazemi
Data/Information Visualizer
Runa Sandvik
1 4
D EEP
L A B
D E E P
L
A
B
P O S S E
D EEP
ADDIE
L A B
15
WAG E NK NE C HT
ALL I S ON
B U RTC H
1 6
D EEP
CL AIRE
L A B
L.
E VANS
DENIS E
C AR U S O
D EEP
HARLO
L A B
17
HOLME S
ING RID
B U RR I NG TON
@lifewinning
lifewinning.com
D EEP
1 8
JEN
L A B
LOW E
JILLI A N
C .
YORK
D EEP
KA T E
L A B
C RAW F OR D
LINDS A Y
HOWARD
19
D EEP
2 0
LORR I E
L A B
FA I T H
C RA NOR
MADDY
VAR NE R
D EEP
MARAL
L A B
21
P OU R KA Z E MI
RUNA
A.
S ANDV I K
2 2
D EEP
L A B
D EEP
L A B
THE CYL AB U S AB LE
PRIVACY AN D S E C U RI T Y
L AB ORATORY
The CyLab Usable Privacy and Security Laboratory
(CUPS) brings together researchers working on a
diverse set of projects related to understanding
and improving the usability of privacy and security
software and systems. CUPS research employs a
combination of three high-level strategies to make
secure systems more usable: building systems that
"just work" without involving humans in securitycritical functions; making secure systems intuitive
and easy to use; and teaching humans how to
perform security-critical tasks.
cups.cs.cmu.edu
23
N
F
A
1
E
2
O T E S
R O M
TA L K.
1 D E C
M B E R
0 1 4 .
JEN LOWE
L A B
onehumanheartbeat.com
D EEP
D EEP
L A B
27
Commodifying Life
Almost a year ago I put my heartbeat online. Along with my
heartbeat, I put up an accounting of all the days Ive lived and the
days I (statistically) have yet to live, and my average heartbeat
for each day.
Its a very intimate measure, in a way, but Im not worried
about sharing it, because theres not much you can learn about
me from my heartrate.
But it turned out I didnt know much about heart rates. If you
look at the data in July, you can see that my average heart rate
goes up and stays up starting in mid-July. Thats because of my
pregnancy.
2 years ago at SXSW I gave a talk with Molly Steenson,
The New Nature and the New Nurture, and I introduced
the Big Data Baby - the first baby to be predicted by big
data, or more specifically by Targets algorithms.
A 2012 article in the New York Times described statisticians
like Andrew Pole at Target who, along with others, used
data mining to come up with an algorithm to determine not
only if a female customer was pregnant, but how far along her
pregnancy was, so Target could send coupons timed to very
specific stages of her pregnancy.
About a year after Pole created his pregnancy-prediction model,
a man walked into a Target outside Minneapolis and demanded
to see the manager. He was clutching coupons that had been sent
to his daughter, and he was angry,
My daughter got this in the mail! he said. Shes still in high
school, and youre sending her coupons for baby clothes and
cribs? Are you trying to encourage her to get pregnant?
bit.ly/1qFTbE4
D EEP
2 8
L A B
The manager didnt have any idea what the man was talking
about. He looked at the mailer. it was addressed to the mans
daughter and contained advertisements for maternity clothing,
nursery furniture and pictures of smiling infants. The manager
apologized and then called a few days later to apologize again.
nyti.ms/1yKn9JT
bit.ly/1wKawyt
Our faces are formed between 2 and 3 months. Big Data Baby
might have been identified by data before its face was formed.
As an experiment, Princeton sociology professor Janet Vertesi
tried to hide her pregnancy from big data. This meant hiding
from Facebook and from Amazon. She also avoided using her
own credit and debit cards to make baby-related purchases.
Circumventing big data not only created awkwardness with
D EEP
L A B
29
her family and friends who wanted to congratulate her on Facebook, the mere fact that big data didnt know what she was doing
created an assumption that she was probably up to something
criminal.
A pregnant womans marketing data is worth 15 times an average
ti.me/1wKaLtj
persons data.
Using big data to identify pregnancy may become
antiquated when more people opt in to heartrate
tracking, companies will be able to predict pregnancy
after just a few weeks, potentially before a woman
even knows shes pregnant.
Big data isnt just in the business of births; its also tracking
deaths. Last January Office Max sent Mike Seay this marketing
mail - a glitch that shows us hes in the daughter killed in car
crash marketing container.
ti.me/1wKaLtj
D EEP
3 0
L A B
Dangerous Resonances
I see two future data directions that are
particularly disturbing. The first is data
colonization.
This is Shamina Singh, from the
MasterCard Center for Inclusive
Growth, speaking at a Data & Society
event, The Social, Cultural & Ethical
bit.ly/1GvDykR
D EEP
L A B
31
D EEP
3 2
L A B
D EEP
L A B
33
D EEP
3 4
L A B
bit.ly/12E8BxF
D EEP
L A B
35
dailym.ai/1uya2VJ
D EEP
3 6
L A B
huff.to/12Eds1R
D EEP
I:
Nina:
L A B
I:
Nina:
37
D EEP
3 8
L A B
slate.me/1wKlLqH
D EEP
L A B
39
These are the most common items given to US police departments under the 1033 program. Complete data can be found at:
http://bit.ly/1A0MAEg
bit.ly/13hY9gb
D EEP
4 0
nyti.ms/1zKO5Z0
L A B
The New York Times visualized the locations of various giveaways from the 1033. Here you see 205 grenade launchers were
given to police, and where those went. Grenade launchers are
primarily used for smoke grenades and tear gas.
Im finding it hard to live in a world where predictive policing
exists, the government is giving police grenade launchers for
tear gas, and I cant go outside to protest because tear gas causes
miscarriage.
D EEP
L A B
41
theatln.tc/1zKOUB7
bit.ly/1spdRfe
D EEP
4 2
L A B
Tangible Silence
Now the abstract terror is that silence will gobble
up (down) the words will overwhelm the
meaning, reinsert the void and the light will go
out and we will all be dead; and the dead are very
silent. By now weve given up magic so we cant
use ritual to force language into better health,
as we once did with the sun. We need some new
strategy. Needless to say we think of a rather
crafty one: we reduce it to a lack or absence and
make it powerless. We say that silence needs
and therefore is waiting to be broken: like
a horse that must be broken in. But we are still
frightened. And the impending ecological disaster
deepens our fear that one day the science will
not work, the language will break down and
the light will go out. We are terrified of silence,
so we encounter it as seldom as possible, even
if this means losing experiences we know to
be good ones, like children wandering alone or
unsupervised in the countryside. We say that
silence is a lack of something, a negative state. We
are terrified of silence and we banish it from our
lives.
Sara Maitland, A Book of Silence, 2008
D EEP
L A B
43
D EEP
4 4
bit.ly/16hcGdt
L A B
D EEP
L A B
Shadow Spaces
So were here working on projects related to privacy and
anonymity and the deep web, and Ive noticed that this weird
thing happens when I talk to people about coming here...
When I mention the deep web, people assume its a place full
of child porn and human trafficking. It reminds me of peoples
reactions when I mention Im from Arizona: they assume its
full of racism and racial profiling.
The deep web and Arizona are both imagined shadow spaces
to be avoided.
45
D EEP
4 6
L A B
D EEP
L A B
47
bit.ly/16heZ06
D EEP
4 8
bit.ly/1uygP0F
bit.ly/1BtsfZx
L A B
D EEP
L A B
The dark web and anonymity on the internet are popularly seen
as shadow, criminal spaces. People ask: Why do you need to be
anonymous? They say: You have nothing to worry about if you
have nothing to hide.
49
D EEP
5 0
L A B
D EEP
L A B
51
5 2
D EEP
L A B
D EEP
L A B
53
D EEP
5 4
L A B
D EEP
L A B
55
5 6
D EEP
L A B
D EEP
L A B
57
D EEP
5 8
L A B
D EEP
L A B
59
6 0
D EEP
L A B
D EEP
L A B
61
C Y B E R
F E M I
N I S M
[s-brfe-m-ni-zm]
CLAIRE L. EVANS
D EEP
6 2
L A B
D EEP
L A B
Thats the 1991 A Cyberfeminist Manifesto for the 21st Century, by VNS Matrix.
63
bit.ly/12Swdi2
D
C EO ENPT EL N
A TB
6 4
The CyberFeminists were techno-utopian thinkers who saw technology as a way to dissolve sex and gender divisions. Of course,
they knew that the digital world, and the cultures emerging from
it, speculative and otherwise, contained as many gendered power dynamics as the real world; the term CyberFeminist itself is
partially a critique of the misogynistic overtones of cyberpunk
literature in the 80s. Still, the CyberFeminists believed in the Internet as a tool of feminist liberation.
There was a lot to love on the web back then. Feminists emerging from a tradition of nonlinear writing and art practices saw
potential in non-narrative hypertext as a medium, and feminist
critics compared web connectivity to the consciousness-raising
groups of 70s third-wave feminism, where women came together to
bit.ly/1zcmwXm
bit.ly/1whpppX
bit.ly/1zcnIdq
The list includes: not for sale, not postmodern, not a fashion
statement, not a picnic, not a media hoax, not science fiction,
andmy personal favoritenot about boring toys for boring
boys.
D
C EO ENPT EL N
A TB
65
Not boring indeed. For CyberFeminists, cyberspace was a sinuous alternate world ripe for creative experimentation. They
made revolutionary CD-ROMs (like Linda Dement's "Cyberflesh
bit.ly/12SGgUa
bit.ly/1GidviO
6 6
D EEP
L A B
Logging into All New Gen, the player is first asked: What is
your gender? Male, Female, Neither. The only right answer is
Neitheranything else will send the player into a loop that
ends the game. Energy in All New Gen is measured in G-slime;
in the battle against the Mainframe and his henchmen (Circuit
Boy, Streetfighter and other total dicks), the player gets help
from mutant shero DNA Sluts. Can you even imagine?
The DNA Sluts, still from All New Gen. Image courtesy of Virginia Barratt.
D EEP
L A B
67
bit.ly/1vWiVwY
bit.ly/1utfvx1
bit.ly/1DiS2YZ
bit.ly/1uqRNRg
bit.ly/1GqD4w9
D EEP
6 8
L A B
VNS Matrix postcard, 1994. Left to Right: Francesca Da Rimini, Virginia Barratt, Julianne
Pierce, Josephine Starrs. Image courtesy of Virgina Barratt.
D EEP
L A B
69
bit.ly/1wENbhO
bit.ly/1whwoiE
his wifeat least were doing something with the attention shit
bit.ly/1yESjNX
7 0
D EEP
L A B
Headline from Australian newspaper The Age, about VNS Matrix, 1995.
D EEP
L A B
71
7 2
D EEP
L A B
D EEP
L A B
73
D EEP
7 4
Virginia Barratt:
L A B
Francesca da Rimini:
Virginia Barratt:
Josephine Starrs:
Australia was avant-garde in the new
media art scene, and Australians
are generally early adopters of new
technologies, perhaps due to physical
distance. Australian female artists are
also innovators and are not afraid to
bit.ly/1BBMDdA
D EEP
L A B
75
D EEP
7 6
L A B
D EEP
L A B
Invite for All New Gen Exhibition,1995. Image via the Australian Centre for
Contemporary Art.
77
bit.ly/1urlUIf
D EEP
7 8
Virginia Barratt:
L A B
Francesca da Rimini:
Virginia Barratt:
D EEP
L A B
79
L A B
D EEP
8 0
The Cyberfeminist Manifesto for the 21st Century in installation, 1995. Image via Virginia Barratt.
D EEP
Virginia Barratt:
L A B
81
bit.ly/1Am9mq3
bit.ly/1Gr1mGw
D EEP
8 2
L A B
bit.ly/12A8sv4
bit.ly/13eiN0G
bit.ly/16cxcf6
Roseanne Stone.
bit.ly/12A8HGC
D EEP
L A B
83
D EEP
8 4
Josephine Starrs:
L A B
D EEP
L A B
85
D EEP
8 6
Virginia Barratt:
L A B
Francesca da Rimini:
bit.ly/1shmDRY
bit.ly/1uruWFf
bit.ly/1whGrUX
D EEP
Virginia Barratt:
L A B
87
D EEP
8 8
Francesca da Rimini:
L A B
D EEP
L A B
89
9 0
D EEP
L A B
D EEP
L A B
91
W H A T
I
S
G O I N G
O
N
ALLISON BURTCH
D EEP
L A B
D EEP
L A B
93
D EEP
9 4
L A B
D EEP
L A B
95
D EEP
S U B
T E X T
L A B
JILLIAN C. YORK
D EEP
L A B
97
9 8
D EEP
L A B
D EEP
L A B
99
Y
O
A
R
O C C
P I E D
O R N O
DENISE CARUSO
U
E
U
.
T
D EEP
1 0 0
L A B
D EEP
L A B
101
D EEP
1 0 2
L A B
Interview subject reacts to seeing her name, her husbands name and address, accessed
from a commercial database.
D EEP
L A B
103
D EEP
1 0 4
L A B
D EEP
L A B
105
D EEP
1 0 6
L A B
Somewhere between now and the time you die, companies may
also use your personal information to segment you into sub-categories based on when you last bought something, and how much
it cost, and how frequently you buy things. Or they may use it to
predict what marketing tactics you will respond to. For instance,
which of these very important magazine covers will you pick up
in line at the grocery store?
One of the excuses that data parasites use for their collection
habits is that audiences spurn traditional advertising and tend
to leave the room, either physically or psychologically, during ad
time. They believe they can circumvent this aversion by knowing even more about us. A he term for this particular invasion
is consumer relationship marketing, cultivating a relationship
with a company that encourages consumers to give up information that can help the company fine-tune discriminatory sales
pitches, and to make sure that we dont somehow tune them out.
D EEP
L A B
107
1 0 8
D EEP
L A B
D EEP
3
W
I
A
U
U
L A B
109
N E
O R
N F
S T
C
R E
INGRID BURRINGTON
T
K
R
R
T
S
1 1 0
D EEP
L A B
D EEP
L A B
111
1 1 2
D EEP
L A B
D EEP
L A B
111 Eighth Avenue is among the more famous sites of New York City
interconnection. Built in 1932, it was initially a Port Authority warehouse and transport center. In 1998, Taconic Investment Partners turned it into a carrier hotel, a co-location center at which
communications infrastructures converge. In 2010, Google purchased the building for nearly $2 million. While Google uses a
majority of the building for its own office space, the carrier hotel
and a number of ISPs, startups, and ground-level retail remains.
During a rare opportunity I had to visit the third floor of the
building for an event, I became giddy at the sight of all the major
ISP names on office doors. I'm so close to the Internet!, I thought.
111 Eighth Avenue is an interchange, like a cloverleaf in a highway. From there, data resonates outward, through cables under
the street and signals in the air.
113
D EEP
1 1 4
L A B
D EEP
L A B
115
D EEP
1 1 6
L A B
D EEP
L A B
117
D EEP
1 1 8
L A B
D EEP
L A B
119
D EEP
1 2 0
L A B
An industrial bakery and a Port Authority warehouse transformed into internet exchanges is perhaps not a surprise--new
infrastructures have a tendency to inherit the homes of past infrastructures, especially in places like Manhattan. The presence
of luxury retail in former industrial spaces is also a familiar
narrative; spaces for other people's leisure love to evoke nostalgia for other people's labor. So it is perhaps not that surprising that law enforcement would situate itself somewhere in the
space between infrastructure and indulgence--as it increasingly
exists to protect and contain both within legible boundaries. Still,
it's jarring to see these vectors of power collapsed onto the same
plane, to see makeshift jails become upscale malls, to see fragments of infrastructure and fragments of history converge but
never quite cohere.
Perhaps it is nave to marvel at corridors like this, where the
parallel presence of industries and ideologies suggest a world of
impossibly casual cruelty. But there is no conspiracy here, merely architectural conveniences and zoning incentives. There are
no devious plots traveling between 111 Eighth Avenue and 85
Tenth Avenue, just overlapping fiber lines and timelines, which
you can see if you know where to look.
D EEP
L A B
121
bit.ly/1zO49t3
1 2 2
D EEP
L A B
D EEP
L A B
123
D EEP
1 2 4
L A B
"...disclosure of the requested records could endanger the life or safety of any person...disclosure
would reveal non-routing criminal investigative
techniques or procedures....[disclosure] of a list of
the locations of all Argus cameras would enable
the planning of criminal activity so as to reduce the
possibility of being caught on video."
Essentially, knowing the locations of all surveillance cameras,
which are supposed to deter crime, enables the committing of
crimes.
D EEP
L A B
125
1 2 6
D EEP
L A B
H. wants me to take my research into data-center-geographyas-power-geography to its (or more accurately, his) natural
conclusion: actual shutdowns of physical network infrastructure
as civil disobedience. Actual destruction of towers and fiber
lines, ploughshares-style. He may or may not be joking.
D EEP
L A B
127
D EEP
1 2 8
L A B
D EEP
L A B
129
D EEP
L A B
D A T A
C E N T
E R T
I P S
INGRID BURRINGTON
D EEP
L A B
Satellite maps.
Once you've found a relevant region, take a look of it on Google
Satellite view. Generally you're lookong for buildings with really
big tanks of water, backup generators attached to their buildings,
or lots of fans on the roof. Street View can also be a useful way to
confirm--the less windows a building has, the more likely it was
built for machines and not for humans
Dead or dying industries.
Infrastructure inherits infrastructure. Data centers need space
and tubes, which places like old paper and textile mills or
warehouses tend to have. Depending on your data center needs,
retrofitting old spaces is a better choice than creating something
entirely new from the ground up. Additionally, places where the
economy's already collapsed are pretty desperate for any new
businesses and will probably be willing to accommodate a data
center's needs.
Tax deals.
This is perhaps a more useful thing to look for if you want to
know if the place you live is about to become a hub for data
centers. A lot of counties and states create generous tax deals
on electricity and water for businesses, to entice companies to
build data centers there. New zoning or tax proposals are useful
indicators.
If you just want to see a data center in person, this is all probably
enough. If you want to get in to a data center, it helps to be a
white man with a book deal or institutional funding who can
easily reach out to companies like Equinix or Google. Good luck
with that.
131
D EEP
1 3 2
L A B
D EEP
L A B
133
1 3 4
D EEP
L A B
D EEP
T
T
R
R
L A B
U
E
135
R
P
ADDIE WAGENKNECHT
JEN LOWE
MARAL POURKAZEMI
HARLO HOLMES
R
E
O
T
D EEP
1 3 6
L A B
The week Deep Lab convened to create this book, the Senate
Select Committee on Intelligence released a redacted version
of its Study of the Central Intelligence Agencys Detention and
Interrogation Program, known colloquially in the media as The
1.usa.gov/1yLNJxj
D EEP
L A B
137
D EEP
L A B
D EEP
L A B
139
1 4 0
D EEP
L A B
D EEP
L A B
141
1 4 2
D EEP
L A B
D EEP
L A B
143
U
N
V E I L
L A N C E
HARLO HOLMES
1 4 4
D EEP
L A B
In a post-Wikileaks,
post-Snowden,
post-Documentcloud,
post-doxxing world; it can
be easy to take the work
done by journalists, data
scientists, and
whistleblowers for
granted.
I wanted to explore that
work, and in doing so,
built an engine, called
Unveillance, that
automates a lot of complex
document-management
tasks.
Unveillance:
D EEP
L A B
145
1 4 6
D EEP
L A B
D EEP
L A B
147
1 4 8
D EEP
L A B
D EEP
L A B
149
3 2 4 /
1 0 3 3
A SELECTION OF OBJECTS FROM
THE PENTAGON'S 1033 PROGRAM
INGRID BURRINGTON
1 5 2
OBSERVATION
HELICOPTER (1)
BAYONET-KNIFE (16)
GRAND SALINE POLICE DEPT, TX, 2014
OBSERVATION
HELICOPTER (1)
EXPLOSIVE ORDNANCE
DISPOSAL SUIT (1)
METALLIC PARTICLE
DETECTOR (1)
OBSERVATION
HELICOPTER (1)
OBSERVATION
HELICOPTER (1)
OBSERVATION
HELICOPTER (1)
OBSERVATION
HELICOPTER (1)
PLATOON EARLY
WARNING SYSTEM (1)
OBSERVATION
HELICOPTER (1)
153
LIGHT ARMORED
VEHICLE (1)
DEKALB POLICE DEPT, IL, 2014
OBSERVATION
HELICOPTER (1)
PICKUP (1)
PEMBERTON TOWNSHIP POLICE DEPT, NJ, 2014
OBSERVATION
HELICOPTER (1)
PINAL COUNTY SHERIFF DEPT, AZ, 2014
OBSERVATION
HELICOPTER (1)
OBSERVATION
HELICOPTER (1)
FRAGMENTATION
PROTECTIVE BODY
ARMOR (1)
FRAGMENTATION
PROTECTIVE BODY
ARMOR (1)
FRAGMENTATION
PROTECTIVE BODY
ARMOR (1)
FRAGMENTATION
PROTECTIVE BODY
ARMOR (1)
FRAGMENTATION
PROTECTIVE BODY
ARMOR (1)
FRAGMENTATION
PROTECTIVE BODY
ARMOR (1)
FRAGMENTATION
PROTECTIVE BODY
ARMOR (1)
CARGO-TRANSPORT
AIRPLANE (1)
BLACK RIVER TECH COLLEGE LE ACAD, AR, 2014
1 5 4
FRAGMENTATION
PROTECTIVE BODY
ARMOR (1)
2014
2014
2014
2014
2014
2014
2014
2014
2014
AUTOMATIC CALIBER
.45 PISTOL (1)
2014
BAYONET (6)
DEKALB COUNTY MARSHALS OFFICE, GA, 2014
AUTOMATIC CALIBER
.45 PISTOL (1)
JACKSON COUNTY SHERIFF DEPT, NC, 2014
N IMAGE INTENSIFIER
(1)
ESSEX COUNTY SHERIFF DEPT, VA, 2014
OUTERSHELLL BASE
VEST (2)
INTENSIFIER (11)
155
INTENSIFIER (11)
2014
MOTOR VEH/TRLR/CYCL
(1)
OBSERVATION
HELICOPTER (1)
OBSERVATION
HELICOPTER (1)
OBSERVATION
HELICOPTER (1)
OBSERVATION
HELICOPTER (1)
OBSERVATION
HELICOPTER (1)
GROUND TROOPS'-PAR-
RUGGED LAPTOP
COMPUTER (4)
CARTRIDGE MAGAZINE
(11)
GROUND TROOPS'
HELMET (5)
BAYONET-KNIFE (2)
(1)
BENT COUNTY SHERIFF, CO, 2014
INFRARED
TRANSMITTER (21)
1 5 6
MINE RESISTANT
VEHICLE (1)
RIFLE ACCESSORIES
POUCH (1)
OBSERVATION
HELICOPTER (1)
SAINT LUCIE COUNTY SHERIFF DEPT, FL, 2014
TRAILER MOUNTED
TENT UTILITIES
SUPPORT UNIT (1)
157
OBSERVATION
HELICOPTER (1)
HEADSET-MICROPHONE
(4)
OBSERVATION
HELICOPTER (1)
PINAL COUNTY SHERIFF DEPT, AZ, 2014
VAN (1)
1 5 8
CENTRIFUGAL PUMP
UNIT (2)
RUGGED LAPTOP
COMPUTER (1)
RUGGED LAPTOP
COMPUTER (1)
RUGGED LAPTOP
COMPUTER (1)
RUGGED LAPTOP
COMPUTER (1)
RUGGED LAPTOP
COMPUTER (1)
RUGGED LAPTOP
COMPUTER (1)
ELECTRIC FLOODLIGHT
SET (1)
L-UNIT WORKSTATION
(1)
HEADSET-MICROPHONE
(5)
OBSERVATION
OBSERVATION
HELICOPTER (1)
HELICOPTER (1)
RADAR SCATTERING
CAMOUFLAGE NET
SYSTEM (2)
FLORENCE POLICE DEPT, AZ, 2014
FORKLIFT (1)
TRAILER MOUNTED
TENT UTILITIES
SUPPORT UNIT (1)
159
OBSERVATION
HELICOPTER (1)
AIRCRAFT ENGINE
STAND (1)
SAN JUAN COUNTY SHERIFF DEPT, NM, 2014
FLOODLIGHT ASSEMBLY
(1)
LIGHT ARMORED
VEHICLE (1)
NE STATE PATROL, NE, 2014
DIGITAL COMPUTER
LIGHT ARMORED
SYSTEM (3)
VEHICLE (1)
1 6 0
PORTTABLE INFANTRY
TARGET SYS (5)
LIGHT ARMORED
VEHICLE (1)
LASER MARKMANSHIP
TRAINING (1)
GROUND TROOPS'
HELMET (6)
TRAILER MOUNTED
TENT UTILITIES
SUPPORT UNIT (1)
161
1 6 2
163
CARTRIDGE RECEIVER
(1)
1 6 4
D EEP
L A B
D EEP
L A B
C EE N
N
C
W EE
W
165
SO
O
S
A
A
ADDIE WAGENKNECHT
JEN LOWE
MARAL POURKAZEMI
R
R
R
R
D EEP
1 6 6
L A B
D EEP
L A B
167
1 6 8
D EEP
L A B
D EEP
L A B
169
bit.ly/1w4F24e
1 7 0
D EEP
L A B
D EEP
L A B
171
1 7 2
D EEP
L A B
D EEP
L A B
173
F O X Y
D O X X
I
N
G
HARLO HOLMES
i wrote something on
tumblr that some
people could not even.
...my timeline
D EEP
L A B
175
wait, actually,
this is getting
out of hand.
my inbox is
blowing up!
now theres a
second dude
jumping into
it. that guy
looks like a
straight-up
axe murderer.
should i be
concerned?
1 7 6
D EEP
L A B
~r
to ing
ne
~
I WAS CYBER-BULLIED
D EEP
L A B
177
1 7 8
D EEP
L A B
I propose a system
whereby anyone
can forward a
mention email to a
little bot on the
internet that will
perform this
research on their
behalf.
the user can put this aggression in the background, and go about the
rest of their day. you know, get out of the house; walk the dog; have
him poo on some bowler hats you see on the sidewalk. just normal
stuff.
D EEP
Dont worry,
its just a
website.
L A B
179
As you return to
the realities of the
physical world, the
bot remains in
cyber space
chronicling the
linear timeline of
the attack; who
tweeted it, who
retweeted it, what
time these things
happened, how
these people are
connected, and
where else on the
internet people are
saying similar
things. After a
period of time,
youd receive a
report
documenting this
particular fray.
1 8 0
D EEP
L A B
D EEP
L A B
181
D EEP
S E C
U R E
D R O P
L A B
RUNA A. SANDVIK
About SecureDrop
The avalanche of disclosures over the recent years has only
intensified the battle between media organizations and the
government, making it more difficult - and more risky - to share
information. SecureDrop is an open-source platform that aims
to help journalists and sources communicate securely using a
number of privacy enhancing tools, including Tor, Tails and GPG.
SecureDrop was originally designed and developed by the late
Aaron Swartz and Kevin Poulsen under the name DeadDrop,
but is now managed by Freedom of the Press Foundation. The
organization helps journalists install and use the system, and
also trains them in security best practices. More than a dozen
news organizations have set up SecureDrop since May 2013, and
more deployments will be announced in early 2015.
D EEP
L A B
183
bit.ly/1zE9lzM
bit.ly/1BC1HrU
T H I
I S M
C H
P T E
D EEP
S
Y
A
R
L A B
MADDY VARNER
D EEP
L A B
185
y2u.be/p2cQSPRTdhg
y2u.be/HdjaiXGUam8
y2u.be/YltarEWBvcA
y2u.be/CFFPhXBa3P4
y2u.be/LxOs6IT8bVE
y2u.be/e-ORhEE9VVg
1 8 6
D EEP
L A B
D EEP
P
A
I
S
A
L A B
187
R I
C
L L
T
T E
LORRIE CRANOR
REBECCA BALEBAKO
DARYA KURILOVA
MANYA SLEEPER
V
Y
U
R
D
D EEP
L A B
Three Concepts of
so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all.
2087 (2001).
D EEP
L A B
189
D EEP
1 9 0
L A B
D EEP
L A B
191
Surveillance
[government surveillance, ads]
Government surveillance and the use of online data for advertising is also a common concern. People are concerned about their
online data being captured by companies and government agencies and wish they had more control. While our youngest contributors did not depict surveillance, this was a common theme
for teenagers and adults.
Complexity and illusion
[illusion, collage]
Privacy is complicated. Some pictures reflect this complexity,
including a wide range of concepts. Others express that privacy
is an illusion, something we cant truly have.
To add to our collection of drawings from children and adults,
we read privacy policies of the 10 most visited US websites (as
of December 2014) and chose the most representative and interesting quotes. We also selected quotes about privacy from celebrities and from the scholarly literature on privacy. These quotes
are interspersed with related drawings in this chapter.
The material we collected is illustrative
of American views on privacy at the
end of 2014. We see a range of simple
and complex concepts. Our contributors were influenced by recent events,
including Edward Snowdens revelations about the NSA, the theft of nude
celebrity selfies from their cell phones,
and Kim Kardashian posing nude for
the cover of Paper magazine.
We created a companion website at http://bit.ly/privacy-illu
that displays all the drawings we collected with accompanying
descriptions. We invite you to contribute your own drawing of
privacy to extend our collection.
bit.ly/1Gl5w4z
1 9 2
D EEP
L A B
D EEP
L A B
193
In my room
D EEP
1 9 4
L A B
Intimacy
Kara 43
D EEP
L A B
195
Under cover
1 9 6
D EEP
L A B
Changing clothes
D EEP
L A B
197
Sibilings
D EEP
1 9 8
L A B
Showering
Privacy means I can do things and not face public ridicule or judgment. Like taking a shower, who wants to have an audience while
taking a shower?
Chris 37
D EEP
L A B
199
Bathroom
2 0 0
D EEP
L A B
Escape
I have four children, two of which I share a bedroom with. Privacy, to me, is to have a space to yourself that no one is allowed in to
keep whatever it is you want to keep for yourself.
Karin 26
D EEP
L A B
201
Doors
D EEP
2 0 2
L A B
D EEP
L A B
203
Personal bubble
Imperturbable!
JK Rowling
Privacy for me is like a place with a one-sided mirror. I can see outside but no one can see in unless
I open the door. Also an extra wall on the outside
just in case.
Kim 21
D EEP
2 0 4
L A B
Control
Privacy is a persons right to select which parties of or all of his personal information or
attributes that can be shared with others.
Privacy Means Respect 29
D EEP
L A B
Our goal is to be clear about what information we collect, so that you can
make meaningful choices about how
it is used.
Google privacy policy
205
2 0 6
D EEP
L A B
A man and his dog companion take a walk to get away from everyone and have time alone for thinking and
reflecting. Sometimes the only way to have privacy is
to just get up and leave.
Paula 62
Privacy means nature, no fences, no boundaries. Man made
constraints like houses, businesses, and resorts dont offer privacy
in my mind. Privacy needs freedom and elements beyond our
control. A curtain of rain offers more privacy than a solid door.
Aneta 45
D EEP
L A B
207
Being able to enjoy the nature in total silence. Being able to inhale
fresh air. To spend the night outside alone, enjoying the moon and
the stars. To just be yourself without anyone noticing.
Pshyche 31
2 0 8
D EEP
L A B
Thoughts
D EEP
L A B
209
I drew two kids taking a test. One is trying to cheat and look at the
other kids paper.
Age 8
2 1 0
D EEP
L A B
Alone online
D EEP
L A B
211
D EEP
2 1 2
L A B
Cyber security
D EEP
L A B
213
Two men are talking at a nearby diner. Theyre having a conversation in the open, however their language is being encrypted with
binary code so other people cant tell what they are speaking.
Shinobu 24
2 1 4
D EEP
L A B
Passwords
D EEP
L A B
215
Locks
When I think of privacy today, my thoughts inevitably turn to internet privacy. Privacy on the internet is important to me because
it can affect my life, liberty, and the pursuit of happiness.
Jay 42
2 1 6
D EEP
L A B
This drawing is about always being watched, hence the eye and
people in power symbols. The red cross out sign is obviously to
cross out all those things, thereby showing what privacy means.
Nate 31
D EEP
L A B
217
Surveillance
Jinny 21
D EEP
2 1 8
L A B
D EEP
L A B
Its a red no entry sign. Behind it is all the messages I see online
every day that I feel invade my privacy and that I wish I could
prevent.
Tiggy 52
A phone declining a spam caller for
privacy reason. People dont like company
or spam to have their private cell phone
number.
Mack 25
219
2 2 0
D EEP
L A B
Social media
D EEP
L A B
221
D EEP
2 2 2
L A B
Employment risks
D EEP
L A B
223
2 2 4
D EEP
L A B
of our users....
time to time.
D EEP
L A B
225
2 2 6
D EEP
L A B
D EEP
L A B
227
Chapter Acknowledgements
Thanks to the students at the Carnegie Mellon Childrens School,
the Pittsburgh Science and Technology Academy, and Pittsburgh
Colfax who contributed drawings to this project, and their
teachers who welcomed us into their classrooms. Thanks also to
the Mechanical Turk workers who contributed their drawings.
Thanks to Abby Marsh for helping with our school visits.
2 2 8
D EEP
L A B
D EEP
L A B
229
A F T E R
WORDS
D EEP
L A B
Final words
Maddy Varner, Ingrid Burrington, and research
assistant Claire Hentschker distilled their thoughts
on the Deep Lab discussions and their experience of
participating in the book sprint.
D EEP
L A B
231
D EEP
2 3 2
L A B
Ive come out of this week exhausted, but better than Ive ever
been. Finals week is brutal at every school and every semester,
but this was perhaps the most intense and stressful one Ive
experienced yet. Education is as masochistic as it is beneficial,
and I spend a lot of time feeling like shit. Its hard to have a
long-term perspective when its three in the morning and your
problem set still isnt finished. When your reward for finishing
your work is simply more work, its hard to see the point of
anything.
Deep Lab has given me hope in the face of academic purgatory
#yolo
It's 10:18pm on Saturday. I would say I'm in Pittsburgh but I'm actually in a university, which is more like being in a citadel than a city.
Maral's been designing for about 12 hours straight. We can't seem to
convince her to stop, although perhaps we're not trying that hard.
Remaining tasks have been delegated. Allison has resigned herself
to her text. The music students in the midst of finals have been
performing the same piece in a nearby practice room for hours. In
Brooklyn, the entire city is apparently shut down in the names of
far too many murdered black men and women. We promised we
would call it a day--like actually call it a day, like stop working completely--at 10. Sharp. So much for that. I get on a plane back to New
York tomorrow. The week is blurry--field trips to data centers, too
much German techno, the torture report, jokes, paper plates with
half-eaten Chinese food.
We said we'd write an afterword. There should be an afterword.
This isn't the afterword. I'm assuming Maddy and Claire are going
to write it and are writing it right now, but I'm writing this anyway.
Maybe just for myself, also for Juna, my friends Erin and Peter's
1-year-old daughter who has been in the back of my mind all week.
I think about the world that Juna will inherit, about the society that
will impose roles on her that she may not want to perform (including the pronouns I'm using to describe her). Humans who can't
really walk or feed themselves or fully comprehend language can
be a pretty compelling motivation to unfuck the world.
I want to tell Juna about this week, even though she's a baby and
doesn't really understand words. I came into this residency-congress-booksprint-I don't know what the fuck with no idea what I
was getting into. Since then, I've experienced more honesty, generosity, and support in these past five days than I have in my entire
art career.
For the last week I've mostly been in a high-ceilinged room at Carnegie Mellon University, surrounded by brilliant women talking
about privacy, surveillance, power, gender, futures. I've heard each
of these women, including myself, self-deprecatingly undermine
their accomplishments and expertise because they're not "tradition-
D EEP
2 3 4
L A B
D EEP
L A B
235
Acknowledgments
The Deep Lab extends its gratitude to the following persons and
institutions:
The Deep Lab participants, both on-location (IRL) and remote:
Addie Wagenknecht, Allison Burtch, Claire L. Evans, Denise
Caruso, Harlo Holmes, Ingrid Burrington, Jen Lowe, Jillian C.
York, Kate Crawford, Julia Kaganskiy, Lindsay Howard, Lorrie
Faith Cranor, Maddy Varner, Maral Pourkazemi, and Runa A.
Sandvik.
The Deep Lab interviews and documentary film were created by:
Jonathan Minard / Deepspeed Media, independent filmmaker
Alex Bolinger, camera operator
The staff of the Frank-Ratchye STUDIO for Creative Inquiry:
Golan Levin, STUDIO Director and Professor, CMU School of Art
Marge Myers, Associate Director
Linda Hager, Business Administrator
Rich Kawood, IT Manager
Caitlin R. Boyle, staff videographer
Claire Hentschker, undergraduate research assistant
Nina Anneli Friman, graduate research assistant
Lorries chapter was created with the collaboration and/or
assistance of:
Darya Kurilova, doctoral student, Software Engineering, CMU
Manya Sleeper, doctoral student, Societal Computing, CMU
Rebecca Balebako, postdoctoral researcher, CUPS lab, CMU
The children of the Carnegie Mellon Childrens School, Pittsburgh
Science and Technology Academy, and Pittsburgh Colfax School
The workers of Amazon Mechanical Turk
Abby Marsh
Content Disclaimer
The thoughts and opinions expressed in this document are those
of the individual contributors alone and do not necessarily reflect
the views or official policies of their employers, Carnegie Mellon
University, its members, funding agencies, or staff. Nor do such
views and opinions necessarily reflect those of The Andy Warhol
Foundation for the Visual Arts, the National Endowment for the
Arts, the Frank-Ratchye Fund for Art @ the Frontier, or any other
individuals or organizations that have provided assistance of any
type. Contributors express views independently and individually.
The thoughts and opinions expressed by one do not necessarily
reflect the views of all (or any) of the other contributors. Neither
this document nor its authors have received any remuneration,
consideration or benefit for mentioning, reporting, including, or
commenting about any program, policy, law, theory, hypothesis,
product, or intellectual property. Any errors, omissions,
oversights or other problems associated with this document are
solely those of the author(s) and no one else. Please notify the
author(s) of errors or any other problems.
License
D EEP
2 4 0
L A B
Colophon
Deep Lab
Published by the Deep Lab and the Frank-Ratchye STUDIO for
Creative Inquiry at Carnegie Mellon University.
http://deeplab.net
http://studioforcreativeinquiry.org
This publication was created during a book sprint at the FrankRatchye STUDIO for Creative Inquiry at Carnegie Mellon University,
December 8-13, 2014. This publication is freely available in digital
form from the publishers.
This book was designed by Maral Pourkazemi.
Additional layout by Claire Hentschker.
This book was set in Droid Serif and Droid Sans, designed by Steve
Matteson of Ascender Corporati on, and Roboto, designed by
Christian Robertson at Google. These fonts are licensed under the
Apache 2.0 License.
ISBN: 978-1-312-77551-0
U.S. Library of Congress Control Number: Pending.
First Edition, December 2014
Version 2012_12_22.a
ISBN 978-1-312-77551-0
90000
9 781312 775510